• Deploy quickly without consulting business
or other stakeholders.
• Disregard existing policy requirements, such
as security and privacy.
• Ignore regulatory mandates.
• Assume vendors (hardware, software,
middleware or any other) have thought
through your particular usage or security
requirements.
• Disregard device-specic attacks or
vulnerabilities.
• Discount privacy considerations or "hide"
data that are collected/transmitted from
end users.